A.
Prompt 1: Communication.
Privacy concerns in communication can arise in various ways, especially in our digital world.
Here are some key issues:
• Data Collection & Surveillance: Governments and corporations may monitor online
activities, phone calls, and messages, raising concerns about personal privacy.
• Unauthorized Access: Hackers or malicious actors can intercept communications,
leading to identity theft or data breaches.
• Lack of Encryption: Messages sent without encryption can be easily accessed by
unintended parties, compromising sensitive information.
• Third-Party Sharing: Companies may sell or share user data without explicit consent,
leading to unwanted advertisements or misuse of personal information.
• Social Engineering & Phishing: Fraudsters manipulate individuals into revealing private
details through deceptive communication. (CoPilot, “Response to what are some of the
privacy and ethical concerns in communication?”, June 4, 2025) Prompt 2: New Devices.
New devices, ingenious gadgets, and IoT (Internet of Things) devices have several privacy
concerns. Here are some key risks:
• Data Collection & Tracking – Many devices gather personal data, including location,
browsing habits, and even voice recordings, often without explicit user consent.
• Weak Security Protections – Some devices have weak passwords or outdated software,
making them vulnerable to hacking.
• Hidden Surveillance – Smart home devices like cameras and microphones can expose
private moments if not adequately secured.
• Third-Party Data Sharing – Companies may share or sell user data to advertisers or
other entities, sometimes without users realizing it.
• Network Vulnerabilities – IoT devices can expose personal networks to cyber threats
without proper encryption. (CoPilot, “Response to
what are some of the privacy and ethical concerns with new devices?” June 4, 2025) B.
One issue not accounted for is data retention. Depending on the website, some stores store
information permanently. This causes the risk for data breaches and even fraud to become
much higher, depending on what information the website now has.
For an issue such as phishing, I would utilize the utilitarianism approach. This approach weighs
the good versus the bad the most. When, for example, a chat box is phishing for information